CVE-2001-0375 – Cisco PIX 4.x/5.x TACACS+ - Denial of Service
https://notcve.org/view.php?id=CVE-2001-0375
Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests. • https://www.exploit-db.com/exploits/20734 http://marc.info/?l=bugtraq&m=98658271707833&w=2 http://www.cisco.com/warp/public/707/pixfirewall-authen-flood-pub.shtml http://www.securityfocus.com/bid/2551 https://exchange.xforce.ibmcloud.com/vulnerabilities/6353 •
CVE-2000-1022 – Cisco PIX Firewall 4.x/5.x - SMTP Content Filtering Evasion
https://notcve.org/view.php?id=CVE-2000-1022
The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands. • https://www.exploit-db.com/exploits/20231 http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml http://www.securityfocus.com/bid/1698 https://exchange.xforce.ibmcloud.com/vulnerabilities/5277 •
CVE-2000-1027 – Cisco PIX Firewall 5.2 - PASV Mode FTP Internal Address Disclosure
https://notcve.org/view.php?id=CVE-2000-1027
Cisco Secure PIX Firewall 5.2(2) allows remote attackers to determine the real IP address of a target FTP server by flooding the server with PASV requests, which includes the real IP address in the response when passive mode is established. • https://www.exploit-db.com/exploits/20369 http://marc.info/?l=bugtraq&m=97059440000367&w=2 http://www.osvdb.org/1623 http://www.securityfocus.com/bid/1877 https://exchange.xforce.ibmcloud.com/vulnerabilities/5646 •
CVE-2000-0613 – PIX Firewall 2.7/3.x/4.x/5 - Forged TCP RST
https://notcve.org/view.php?id=CVE-2000-0613
Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections. • https://www.exploit-db.com/exploits/20067 http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml http://www.osvdb.org/1457 http://www.securityfocus.com/bid/1454 http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net https://exchange.xforce.ibmcloud.com/vulnerabilities/4928 •
CVE-2000-0150
https://notcve.org/view.php?id=CVE-2000-0150
Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. • http://www.kb.cert.org/vuls/id/328867 http://www.osvdb.org/4417 http://www.securityfocus.com/bid/979 •